vicsanjinez / wazuh-config
Configurations to implement Wazuh
☆11Updated 2 years ago
Alternatives and similar repositories for wazuh-config:
Users that are interested in wazuh-config are comparing it to the libraries listed below
- SIEM Cheat Sheet☆73Updated last year
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆48Updated 9 months ago
- Wazuh integration TheHive☆34Updated last year
- ☆33Updated last year
- ☆162Updated 10 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆28Updated 4 months ago
- ☆95Updated 2 weeks ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆102Updated 7 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Useful resources about phishing email analysis☆77Updated 3 years ago
- Some important DFIR Resources☆83Updated last year
- ☆43Updated last year
- CrowdStrike Falcon Queries For Advanced Threat Detection☆16Updated 2 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆60Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆81Updated last year
- MISP Playbooks☆182Updated last week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆47Updated last week
- A collection of various SIEM rules relating to malware family groups.☆65Updated 7 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- Some Threat Hunting queries useful for blue teamers☆124Updated 2 years ago
- ☆31Updated 3 years ago
- ☆205Updated 8 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆218Updated last year
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆21Updated this week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆12Updated 2 years ago
- MISP to Sentinel integration☆62Updated 2 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆171Updated last month
- Cybersecurity Incident Response Plan☆88Updated 4 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 9 months ago